Passwordless in Practice: Comparing Enterprise Deployment Architectures
About the Security Event
Passkeys and phishing-resistant authentication are no longer experimental, but deploying them across real enterprise environments is still a hard architectural problem.
Large organizations rarely start from a greenfield. They operate a mix of legacy applications, modern web platforms, on-prem and cloud identity systems, and multiple authentication protocols. Choosing how to deploy passwordless authentication often matters more than choosing which standard to use.
In this session, Bartosz Cieszewski will provide a clear, practical comparison of the main enterprise architectures used to deploy passwordless authentication at scale.
What this webinar covers:
- The most common passwordless deployment architectures used in large organizations
- Native vs mediated approaches (application-level, identity-layer, and access-layer models)
- How different architectures impact legacy applications, IAM complexity, and operational risk
- Trade-offs between security guarantees, rollout speed, and long-term maintainability
- How to select an architecture that fits your existing systems, not an idealized future state
This is a technical, vendor-agnostic discussion focused on decision-making - not product demos.
Who should attend:
- IAM and security architects
- Enterprise platform and identity engineers
- CISOs and security leaders responsible for authentication strategy
- Teams planning or evaluating passkey adoption in complex environments
Please note: a company (business) email address is required to confirm registration. Registrations submitted with personal or non-business email domains will be declined.